identity

Emphasis on cloud computing, eGovernment, citizen and national e-identities, open identity initatives, law, policy, standards-based identity infrastructures, and secure information sharing and collaboration.

Browse by Tags

Related Posts
  • Blog Post: The Laws of Identity (2005)

    The Laws of Identity - The Internet was built without a way to know who and what you are connecting to. This limits what we can do with it and exposes us to growing dangers. If we do nothing, we will face rapidly proliferating episodes of theft and deception which will cumulatively erode public trust...
  • Blog Post: Microsoft at the European Identity Conference and Cloud Summit 2010 in Munich, Germany

    The European Identity Conference & Cloud Summit 2010 , in Munich, Germany kicks-off next week, check out our session below! Hosted by Kuppinger Cole & Partners Our Sessions Kim Cameron 05/04/2010 17:00-17:30 Federated Directory meets Minimal Disclosure: Mortal...
  • Blog Post: A User-centric Identity Metasystem (2008)

    This paper proposes a framework for protecting privacy and avoiding the unnecessary propagation of identity information while facilitating exchange of specific information needed by Internet systems to personalize and control access to services. It also sets out factors to be taken into consideration...
  • Blog Post: Internet Identity Workshop XI - November 2-4, Mountain View, CA

    The Internet Identity Workshop focuses on “user-centric identity” and trying to solve the technical challenge of how people can manage their identity across the range of websites, services, companies and organizations that they belong to, purchase from and participate with. Participants work...